First published: Sat Dec 15 2007(Updated: )
Stack-based buffer overflow in PccScan.dll before build 1451 in Trend Micro AntiVirus plus AntiSpyware 2008, Internet Security 2008, and Internet Security Pro 2008 allows user-assisted remote attackers to cause a denial of service (SfCtlCom.exe crash), and allows local users to gain privileges, via a malformed .zip archive with a long name, as demonstrated by a .zip file created via format string specifiers in a crafted .uue file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro AntiVirus plus AntiSpyware | =2008-bld_1450 | |
Trend Micro Trend Micro Internet Security Pro | ||
Trend Micro Internet Security | =2008-bld_1451 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6386 is classified as a high-severity vulnerability due to its potential for denial of service and privilege escalation.
To mitigate CVE-2007-6386, upgrade to Trend Micro AntiVirus plus AntiSpyware or Internet Security 2008 build 1451 or later.
Exploitation of CVE-2007-6386 can lead to a denial of service by crashing SfCtlCom.exe and allow local users to gain increased privileges.
CVE-2007-6386 affects Trend Micro AntiVirus plus AntiSpyware 2008 build 1450, Internet Security 2008, and Internet Security Pro 2008.
Yes, CVE-2007-6386 can be exploited by remote attackers, but it requires user assistance to trigger the vulnerability.